intro to ecat

9
ECAT – Enterprise Compromise Assessment Chad Loeven, VP Sales and Marketing Pascal Longpre, Founder and CTO

Upload: cloeven

Post on 24-Jan-2015

714 views

Category:

Documents


2 download

DESCRIPTION

A brief presentation on how ECAT fills the detection gap between AV and Forensics

TRANSCRIPT

Page 1: Intro To ECAT

ECAT – Enterprise Compromise Assessment

Chad Loeven, VP Sales and MarketingPascal Longpre, Founder and CTO

Page 2: Intro To ECAT

Enterprise security todayAV on desktop and server

Firewall

IPS SIEM

• Bluetooth and WiFi can bypass in-line devices

• Inline devices can’t identify what happened on the host in a compromise

Page 3: Intro To ECAT

Kaspersky – Rated #1 AV overall

>42% of all new malware passed

through undetected

Page 4: Intro To ECAT

ECAT fills the detection gap

Incident -> Rapid breach detection Recovery Forensics

Page 5: Intro To ECAT

The ECAT solution: no signatures• Host-based Deep Scan

• Network traffic

• Live Memory Analysis

• Machine Suspect Level

Page 6: Intro To ECAT

ECAT Agent

ECAT Agent

ECAT AgentECAT Agent

ECAT Agent

ECAT Agent

ECAT Agent ECAT Agent

ECAT Overview – server and agent

Report over SSL

UDP heartbeat

Server-side analysis of the endpoint

Page 7: Intro To ECAT

ECAT – Baselines and whitelists

Whitelisting:• Bit9 Global Software Registry (GSR)• NIST database of known-good hashes• ECAT whitelist including Microsoft MSDN

• Server-side Cert validation

• Opswat Metascan scans against 6 or more AV engines

Page 8: Intro To ECAT

ECAT – Enterprise Compromise Assessment

Full System Inventory

Live Memory Analysis

Direct physical disk inspection

Certificate Validation

Application Whitelisting

Multi-engine AV scan

Network Traffic analysis

• Rapid Breach Detection

• Signature-less

• Fills the gap in desktop defense

• Actionable information -fast

• Remediation

Page 9: Intro To ECAT

in a Finding an evil

haystack

ECAT – Enterprise Compromise Assessment

www.siliciumsecurity.com